Home
last modified time | relevance | path

Searched refs:password (Results 1 - 25 of 63) sorted by relevance

123

/kernel/linux/linux-5.10/security/keys/encrypted-keys/
H A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
62 * Removed auth_tok->token.password.salt and in ecryptfs_fill_auth_tok()
63 * auth_tok->token.password.session_key_encryption_key in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/kernel/linux/linux-6.6/security/keys/encrypted-keys/
H A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
62 * Removed auth_tok->token.password.salt and in ecryptfs_fill_auth_tok()
63 * auth_tok->token.password.session_key_encryption_key in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/kernel/linux/linux-6.6/arch/powerpc/platforms/pseries/
H A Dplpks.c48 u8 password[]; member
132 u8 *password, consumer = PLPKS_OS_OWNER; in plpks_gen_password() local
135 // If we booted from kexec, we could be reusing an existing password already in plpks_gen_password()
141 // The password must not cross a page boundary, so we align to the next power of 2 in plpks_gen_password()
142 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL); in plpks_gen_password()
143 if (!password) in plpks_gen_password()
147 virt_to_phys(password), maxpwsize); in plpks_gen_password()
153 kfree(password); in plpks_gen_password()
156 memcpy(ospassword, password, ospasswordlength); in plpks_gen_password()
166 kfree(password); in plpks_gen_password()
662 const u8 *password; plpks_early_init_devtree() local
[all...]
/kernel/linux/linux-5.10/fs/ecryptfs/
H A Ddebug.c29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
H A Dkeystore.c738 "password tokens\n", __func__); in ecryptfs_write_tag_70_packet()
760 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
761 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet()
815 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
819 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_write_tag_70_packet()
823 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1026 "password tokens\n", __func__); in ecryptfs_parse_tag_70_packet()
1031 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1035 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_parse_tag_70_packet()
1039 s->auth_tok->token.password in ecryptfs_parse_tag_70_packet()
[all...]
/kernel/linux/linux-6.6/fs/ecryptfs/
H A Ddebug.c29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
H A Dkeystore.c739 "password tokens\n", __func__); in ecryptfs_write_tag_70_packet()
761 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
762 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet()
816 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
820 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_write_tag_70_packet()
824 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1027 "password tokens\n", __func__); in ecryptfs_parse_tag_70_packet()
1032 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1036 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_parse_tag_70_packet()
1040 s->auth_tok->token.password in ecryptfs_parse_tag_70_packet()
[all...]
/kernel/linux/linux-6.6/fs/smb/client/
H A Dfs_context.c163 fsparam_string("password", Opt_pass),
316 new_ctx->password = NULL; in smb3_fs_context_dup()
328 DUP_CTX_STR(password); in smb3_fs_context_dup()
798 if (new_ctx->password && in smb3_verify_reconfigure_ctx()
799 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx()
802 "can not change password of active session during remount\n"); in smb3_verify_reconfigure_ctx()
806 "can not change password for Kerberos via remount\n"); in smb3_verify_reconfigure_ctx()
864 * We can not change UNC/username/password/domainnam in smb3_reconfigure()
[all...]
/kernel/linux/linux-5.10/sound/isa/opti9xx/
H A Dopti92x-ad1848.c119 unsigned char password; member
204 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init()
210 chip->password = 0xe5; in snd_opti9xx_init()
221 chip->password = 0xe4; in snd_opti9xx_init()
240 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
248 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
264 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
283 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
291 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
307 outb(chip->password, chi in snd_opti9xx_write()
[all...]
H A Dmiro.c96 unsigned char password; member
795 chip->password = 0xe3; in snd_miro_init()
799 chip->password = 0xe5; in snd_miro_init()
817 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
823 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
847 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
853 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
/kernel/linux/linux-6.6/sound/isa/opti9xx/
H A Dopti92x-ad1848.c113 unsigned char password; member
198 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init()
204 chip->password = 0xe5; in snd_opti9xx_init()
215 chip->password = 0xe4; in snd_opti9xx_init()
234 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
242 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
258 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
277 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
285 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
301 outb(chip->password, chi in snd_opti9xx_write()
[all...]
/kernel/linux/linux-6.6/drivers/platform/x86/
H A Dthink-lmi.c71 * Description: Change a specific password.
76 * - A password cannot be set using this method when one does not already
141 * Description: Switch from certificate to password authentication.
287 /* Get password settings from BIOS */
332 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument
335 password); in tlmi_save_bios_settings()
408 /* pwdlen == 0 is allowed to clear the password */ in current_password_store()
412 strscpy(setting->password, buf, setting->maxlen); in current_password_store()
413 /* Strip out CR if one is present, setting password won't work if it is present */ in current_password_store()
414 strip_cr(setting->password); in current_password_store()
[all...]
H A Dthink-lmi.h30 /* password configuration details */
52 /* password setting details */
56 char password[TLMI_PWD_BUFSIZE]; member
/kernel/linux/linux-6.6/drivers/platform/x86/hp/hp-bioscfg/
H A Dpasswdobj-attributes.c3 * Functions corresponding to password object type attributes under
12 GET_INSTANCE_ID(password); variable
82 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password);
136 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password);
139 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password);
171 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP);
390 * Populate all properties for an instance under password attribute
392 * @password_obj: ACPI object with password data
499 * Populate all properties for an instance under password object attribute
/kernel/linux/linux-5.10/fs/cifs/
H A Dcifsencrypt.c281 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response()
289 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response()
305 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument
312 if (password) { in calc_lanman_hash()
314 if (!password[len]) in calc_lanman_hash()
317 memcpy(password_with_pad, password, len); in calc_lanman_hash()
511 /* calculate md4 hash of password */ in calc_ntlmv2_hash()
512 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
H A Dconnect.c237 { Opt_blank_pass, "password=" },
239 { Opt_pass, "password=%s" },
1977 * Check if this is a case where the password in cifs_parse_mount_options()
1983 /* No it is not. Set the password to NULL */ in cifs_parse_mount_options()
1984 kfree_sensitive(vol->password); in cifs_parse_mount_options()
1985 vol->password = NULL; in cifs_parse_mount_options()
2022 kfree_sensitive(vol->password); in cifs_parse_mount_options()
2023 /* Now build new password string */ in cifs_parse_mount_options()
2025 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options()
2026 if (vol->password in cifs_parse_mount_options()
[all...]
/kernel/linux/linux-5.10/drivers/input/mouse/
H A Delan_i2c_smbus.c352 u16 password; in elan_smbus_prepare_fw_update() local
366 /* write iap password */ in elan_smbus_prepare_fw_update()
369 dev_err(dev, "cannot write iap password\n"); in elan_smbus_prepare_fw_update()
376 dev_err(dev, "failed to write iap password: %d\n", in elan_smbus_prepare_fw_update()
382 * Read back password to make sure we enabled flash in elan_smbus_prepare_fw_update()
390 dev_err(dev, "failed to read iap password: %d\n", in elan_smbus_prepare_fw_update()
395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
[all...]
H A Delan_i2c_i2c.c562 u16 password; in elan_i2c_prepare_fw_update() local
613 dev_err(dev, "cannot read iap password: %d\n", in elan_i2c_prepare_fw_update()
618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/kernel/linux/linux-5.10/drivers/scsi/qla4xxx/
H A Dql4_glbl.h84 char *password, int bidi, uint16_t *chap_index);
85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
169 char *password, uint16_t idx);
268 char *password, uint16_t chap_index);
H A Dql4_mbx.c1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument
1614 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1627 * @password: CHAP password to set
1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument
1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap()
1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap()
1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index()
1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1735 strlcpy(password, chap_tabl in qla4xxx_get_uni_chap_at_index()
1691 qla4xxx_get_uni_chap_at_index(struct scsi_qla_host *ha, char *username, char *password, uint16_t chap_index) qla4xxx_get_uni_chap_at_index() argument
1758 qla4xxx_get_chap_index(struct scsi_qla_host *ha, char *username, char *password, int bidi, uint16_t *chap_index) qla4xxx_get_chap_index() argument
[all...]
/kernel/linux/linux-6.6/drivers/scsi/qla4xxx/
H A Dql4_glbl.h84 char *password, int bidi, uint16_t *chap_index);
85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
168 char *password, uint16_t idx);
267 char *password, uint16_t chap_index);
H A Dql4_mbx.c1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument
1614 strscpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1627 * @password: CHAP password to set
1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument
1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap()
1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap()
1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index()
1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1735 strscpy(password, chap_tabl in qla4xxx_get_uni_chap_at_index()
1691 qla4xxx_get_uni_chap_at_index(struct scsi_qla_host *ha, char *username, char *password, uint16_t chap_index) qla4xxx_get_uni_chap_at_index() argument
1758 qla4xxx_get_chap_index(struct scsi_qla_host *ha, char *username, char *password, int bidi, uint16_t *chap_index) qla4xxx_get_chap_index() argument
[all...]
/kernel/linux/linux-6.6/drivers/input/mouse/
H A Delan_i2c_smbus.c352 u16 password; in elan_smbus_prepare_fw_update() local
366 /* write iap password */ in elan_smbus_prepare_fw_update()
369 dev_err(dev, "cannot write iap password\n"); in elan_smbus_prepare_fw_update()
376 dev_err(dev, "failed to write iap password: %d\n", in elan_smbus_prepare_fw_update()
382 * Read back password to make sure we enabled flash in elan_smbus_prepare_fw_update()
390 dev_err(dev, "failed to read iap password: %d\n", in elan_smbus_prepare_fw_update()
395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
[all...]
H A Delan_i2c_i2c.c562 u16 password; in elan_i2c_prepare_fw_update() local
613 dev_err(dev, "cannot read iap password: %d\n", in elan_i2c_prepare_fw_update()
618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/kernel/linux/linux-5.10/tools/testing/selftests/net/
H A Dnettest.c78 const char *password; member
79 /* prefix for MD5 password */
212 int keylen = strlen(args->password); in tcp_md5sig()
218 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig()
238 /* ENOENT is harmless. Returned when a password is cleared */ in tcp_md5sig()
1215 if (args->password && tcp_md5_remote(lsd, args)) { in do_server()
1336 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock()
1599 " -M password use MD5 sum protection\n" in print_usage()
1692 args.password = optarg; in main()
1761 if (args.password in main()
[all...]

Completed in 28 milliseconds

123